Skip to main content

Showing 1–36 of 36 results for author: Sun, M

Searching in archive stat. Search in all archives.
.
  1. arXiv:2407.00791  [pdf, other

    stat.ME stat.CO

    inlabru: software for fitting latent Gaussian models with non-linear predictors

    Authors: Finn Lindgren, Fabian Bachl, Janine Illian, Man Ho Suen, HÃ¥vard Rue, Andrew E. Seaton

    Abstract: The integrated nested Laplace approximation (INLA) method has become a popular approach for computationally efficient approximate Bayesian computation. In particular, by leveraging sparsity in random effect precision matrices, INLA is commonly used in spatial and spatio-temporal applications. However, the speed of INLA comes at the cost of restricting the user to the family of latent Gaussian mode… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

    MSC Class: 62-04

  2. arXiv:2311.00674  [pdf, other

    stat.ML cs.LG

    Recovering Linear Causal Models with Latent Variables via Cholesky Factorization of Covariance Matrix

    Authors: Yunfeng Cai, Xu Li, Minging Sun, ** Li

    Abstract: Discovering the causal relationship via recovering the directed acyclic graph (DAG) structure from the observed data is a well-known challenging combinatorial problem. When there are latent variables, the problem becomes even more difficult. In this paper, we first propose a DAG structure recovering algorithm, which is based on the Cholesky factorization of the covariance matrix of the observed da… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  3. arXiv:2301.10677  [pdf, other

    cs.AI cs.LG stat.ML

    Imitating Human Behaviour with Diffusion Models

    Authors: Tim Pearce, Tabish Rashid, Anssi Kanervisto, Dave Bignell, Mingfei Sun, Raluca Georgescu, Sergio Valcarcel Macua, Shan Zheng Tan, Ida Momennejad, Katja Hofmann, Sam Devlin

    Abstract: Diffusion models have emerged as powerful generative models in the text-to-image domain. This paper studies their application as observation-to-action models for imitating human behaviour in sequential environments. Human behaviour is stochastic and multimodal, with structured correlations between action dimensions. Meanwhile, standard modelling choices in behaviour cloning are limited in their ex… ▽ More

    Submitted 3 March, 2023; v1 submitted 25 January, 2023; originally announced January 2023.

    Comments: Published in ICLR 2023

    Journal ref: ICLR 2023

  4. arXiv:2212.02083  [pdf, other

    cs.LG stat.ML

    On the Overlooked Structure of Stochastic Gradients

    Authors: Zeke Xie, Qian-Yuan Tang, Mingming Sun, ** Li

    Abstract: Stochastic gradients closely relate to both optimization and generalization of deep neural networks (DNNs). Some works attempted to explain the success of stochastic optimization for deep learning by the arguably heavy-tail properties of gradient noise, while other works presented theoretical and empirical evidence against the heavy-tail hypothesis on gradient noise. Unfortunately, formal statisti… ▽ More

    Submitted 20 October, 2023; v1 submitted 5 December, 2022; originally announced December 2022.

    Comments: NeurIPS 2023. 20 pages, 16 figures, 17 Tables; Key Words: Deep Learning, Stochastic Gradient, Optimization. arXiv admin note: text overlap with arXiv:2201.13011

  5. arXiv:2201.10770  [pdf, other

    stat.ME stat.ML

    Confidence intervals for the Cox model test error from cross-validation

    Authors: Min Woo Sun, Robert Tibshirani

    Abstract: Cross-validation (CV) is one of the most widely used techniques in statistical learning for estimating the test error of a model, but its behavior is not yet fully understood. It has been shown that standard confidence intervals for test error using estimates from CV may have coverage below nominal levels. This phenomenon occurs because each sample is used in both the training and testing procedur… ▽ More

    Submitted 6 October, 2023; v1 submitted 26 January, 2022; originally announced January 2022.

    Journal ref: Statistics in Medicine. 2023; 1-10

  6. arXiv:2105.03692  [pdf, other

    cs.LG cs.CR stat.ML

    Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks

    Authors: Charles **, Melinda Sun, Martin Rinard

    Abstract: We propose a novel clustering mechanism based on an incompatibility property between subsets of data that emerges during model training. This mechanism partitions the dataset into subsets that generalize only to themselves, i.e., training on one subset does not improve performance on the other subsets. Leveraging the interaction between the dataset and the training process, our clustering mechanis… ▽ More

    Submitted 27 April, 2023; v1 submitted 8 May, 2021; originally announced May 2021.

    Comments: ICLR 2023. Code is available at https://github.com/charles**/compatibility_clustering/

  7. arXiv:2102.06735  [pdf, other

    cs.LG stat.ML

    Learning Deep Neural Networks under Agnostic Corrupted Supervision

    Authors: Boyang Liu, Mengying Sun, Ding Wang, Pang-Ning Tan, Jiayu Zhou

    Abstract: Training deep neural models in the presence of corrupted supervision is challenging as the corrupted data points may significantly impact the generalization performance. To alleviate this problem, we present an efficient robust algorithm that achieves strong guarantees without any assumption on the type of corruption and provides a unified framework for both classification and regression problems.… ▽ More

    Submitted 12 February, 2021; originally announced February 2021.

  8. arXiv:2009.14737  [pdf, other

    cs.LG cs.CV stat.ML

    Improving Auto-Augment via Augmentation-Wise Weight Sharing

    Authors: Keyu Tian, Chen Lin, Ming Sun, Lu** Zhou, Junjie Yan, Wanli Ouyang

    Abstract: The recent progress on automatically searching augmentation policies has boosted the performance substantially for various tasks. A key component of automatic augmentation search is the evaluation process for a particular augmentation policy, which is utilized to return reward and usually runs thousands of times. A plain evaluation process, which includes full model training and validation, would… ▽ More

    Submitted 22 October, 2020; v1 submitted 30 September, 2020; originally announced September 2020.

    Comments: Accepted to NeurIPS 2020 (Poster)

  9. arXiv:2006.15214  [pdf, other

    q-fin.ST stat.AP

    Improving MF-DFA model with applications in precious metals market

    Authors: Zhongjun Wang, Mengye Sun, A. M. Elsawah

    Abstract: With the aggravation of the global economic crisis and inflation, the precious metals with safe-haven function have become more popular. An improved MF-DFA method is proposed to analyze price fluctuations of the precious metals market. Based on the widely used multifractal detrended fluctuation analysis method (MF-DFA), we compare these two methods and find that the Bi-OSW-MF-DFA method possesses… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: 23 pages, 17 figures, 6 tables

  10. arXiv:2006.06762  [pdf, other

    cs.LG cs.NE cs.PF cs.PL stat.ML

    Ansor: Generating High-Performance Tensor Programs for Deep Learning

    Authors: Lianmin Zheng, Chengfan Jia, Minmin Sun, Zhao Wu, Cody Hao Yu, Ameer Haj-Ali, Yida Wang, Jun Yang, Danyang Zhuo, Koushik Sen, Joseph E. Gonzalez, Ion Stoica

    Abstract: High-performance tensor programs are crucial to guarantee efficient execution of deep neural networks. However, obtaining performant tensor programs for different operators on various hardware platforms is notoriously challenging. Currently, deep learning systems rely on vendor-provided kernel libraries or various search strategies to get performant tensor programs. These approaches either require… ▽ More

    Submitted 15 October, 2023; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: OSDI 2020

  11. arXiv:2003.05622  [pdf, other

    cs.DC cs.LG stat.ML

    Distributed Hierarchical GPU Parameter Server for Massive Scale Deep Learning Ads Systems

    Authors: Weijie Zhao, Ronglai Jia, Yulei Qian, Ruiquan Ding, Mingming Sun, ** Li

    Abstract: Neural networks of ads systems usually take input from multiple resources, e.g., query-ad relevance, ad features and user portraits. These inputs are encoded into one-hot or multi-hot binary features, with typically only a tiny fraction of nonzero feature values per example. Deep learning models in online advertising industries can have terabyte-scale parameters that do not fit in the GPU memory n… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

  12. arXiv:2003.01908  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Denoised Smoothing: A Provable Defense for Pretrained Classifiers

    Authors: Hadi Salman, Mingjie Sun, Greg Yang, Ashish Kapoor, J. Zico Kolter

    Abstract: We present a method for provably defending any pretrained image classifier against $\ell_p$ adversarial attacks. This method, for instance, allows public vision API providers and users to seamlessly convert pretrained non-robust classification services into provably robust ones. By prepending a custom-trained denoiser to any off-the-shelf image classifier and using randomized smoothing, we effecti… ▽ More

    Submitted 20 September, 2020; v1 submitted 4 March, 2020; originally announced March 2020.

    Comments: 10 pages main text; 29 pages total

  13. arXiv:2002.10947  [pdf, other

    cs.LG stat.ML

    Towards an Efficient and General Framework of Robust Training for Graph Neural Networks

    Authors: Kaidi Xu, Sijia Liu, Pin-Yu Chen, Mengshu Sun, Caiwen Ding, Bhavya Kailkhura, Xue Lin

    Abstract: Graph Neural Networks (GNNs) have made significant advances on several fundamental inference tasks. As a result, there is a surge of interest in using these models for making potentially important decisions in high-regret applications. However, despite GNNs' impressive performance, it has been observed that carefully crafted perturbations on graph structures (or nodes attributes) lead them to make… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: Accepted by ICASSP 2020

  14. arXiv:2002.09143  [pdf, other

    cs.LG cs.SD eess.AS stat.ML

    Few-shot acoustic event detection via meta-learning

    Authors: Bowen Shi, Ming Sun, Krishna C. Puvvada, Chieh-Chi Kao, Spyros Matsoukas, Chao Wang

    Abstract: We study few-shot acoustic event detection (AED) in this paper. Few-shot learning enables detection of new events with very limited labeled data. Compared to other research areas like computer vision, few-shot learning for audio recognition has been under-studied. We formulate few-shot AED problem and explore different ways of utilizing traditional supervised methods for this setting as well as a… ▽ More

    Submitted 21 February, 2020; originally announced February 2020.

    Comments: ICASSP 2020

  15. arXiv:1909.08961  [pdf, other

    eess.AS cs.LG cs.SD stat.ML

    Acoustic scene analysis with multi-head attention networks

    Authors: Weimin Wang, Weiran Wang, Ming Sun, Chao Wang

    Abstract: Acoustic Scene Classification (ASC) is a challenging task, as a single scene may involve multiple events that contain complex sound patterns. For example, a cooking scene may contain several sound sources including silverware clinking, chop**, frying, etc. What complicates ASC more is that classes of different activities could have overlap** sounds patterns (e.g. both cooking and dishwashing c… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

    Comments: 8 pages, 6 figures

  16. arXiv:1908.01843  [pdf, other

    cs.CL cs.AI cs.LG stat.ML

    GEAR: Graph-based Evidence Aggregating and Reasoning for Fact Verification

    Authors: Jie Zhou, Xu Han, Cheng Yang, Zhiyuan Liu, Lifeng Wang, Changcheng Li, Maosong Sun

    Abstract: Fact verification (FV) is a challenging task which requires to retrieve relevant evidence from plain text and use the evidence to verify given claims. Many claims require to simultaneously integrate and reason over several pieces of evidence for verification. However, previous work employs simple models to extract information from evidence without letting evidence communicate with each other, e.g.… ▽ More

    Submitted 22 July, 2019; originally announced August 2019.

    Comments: Accepted by ACL 2019

  17. arXiv:1907.09470  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Characterizing Attacks on Deep Reinforcement Learning

    Authors: Xinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, **feng Yi, Zijiang Yang, Mingyan Liu, Bo Li, Dawn Song

    Abstract: Recent studies show that Deep Reinforcement Learning (DRL) models are vulnerable to adversarial attacks, which attack DRL models by adding small perturbations to the observations. However, some attacks assume full availability of the victim model, and some require a huge amount of computation, making them less feasible for real world applications. In this work, we make further explorations of the… ▽ More

    Submitted 16 February, 2022; v1 submitted 21 July, 2019; originally announced July 2019.

    Comments: AAMAS 2022, 13 pages, 6 figures

  18. arXiv:1907.08937  [pdf, other

    cs.AI cs.CL cs.LG stat.ML

    Quantifying Similarity between Relations with Fact Distribution

    Authors: Weize Chen, Hao Zhu, Xu Han, Zhiyuan Liu, Maosong Sun

    Abstract: We introduce a conceptually simple and effective method to quantify the similarity between relations in knowledge bases. Specifically, our approach is based on the divergence between the conditional probability distributions over entity pairs. In this paper, these distributions are parameterized by a very simple neural network. Although computing the exact similarity is in-tractable, we provide a… ▽ More

    Submitted 21 July, 2019; originally announced July 2019.

    Comments: ACL 2019

  19. arXiv:1905.12310  [pdf, other

    cs.LG cs.AI stat.ML

    Adversarial Imitation Learning from Incomplete Demonstrations

    Authors: Mingfei Sun, Xiaojuan Ma

    Abstract: Imitation learning targets deriving a map** from states to actions, a.k.a. policy, from expert demonstrations. Existing methods for imitation learning typically require any actions in the demonstrations to be fully available, which is hard to ensure in real applications. Though algorithms for learning with unobservable actions have been proposed, they focus solely on state information and overlo… ▽ More

    Submitted 23 June, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: Accepted to International Joint Conference on Artificial Intelligence (IJCAI-19)

  20. arXiv:1905.08509  [pdf, ps, other

    cs.LG cs.CV stat.ML

    Mutual Information Maximization in Graph Neural Networks

    Authors: Xinhan Di, Pengqian Yu, Rui Bu, Mingchao Sun

    Abstract: A variety of graph neural networks (GNNs) frameworks for representation learning on graphs have been recently developed. These frameworks rely on aggregation and iteration scheme to learn the representation of nodes. However, information between nodes is inevitably lost in the scheme during learning. In order to reduce the loss, we extend the GNNs frameworks by exploring the aggregation and iterat… ▽ More

    Submitted 23 March, 2020; v1 submitted 21 May, 2019; originally announced May 2019.

    Comments: Accepted for presentation at IJCNN 2020

  21. arXiv:1903.10304  [pdf, other

    cs.LG stat.ML

    Learning a Multi-Modal Policy via Imitating Demonstrations with Mixed Behaviors

    Authors: Fang-I Hsiao, Jui-Hsuan Kuo, Min Sun

    Abstract: We propose a novel approach to train a multi-modal policy from mixed demonstrations without their behavior labels. We develop a method to discover the latent factors of variation in the demonstrations. Specifically, our method is based on the variational autoencoder with a categorical latent variable. The encoder infers discrete latent factors corresponding to different behaviors from demonstratio… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: 10pages, 4 figures, NIPS 2018 workshop

  22. arXiv:1812.08434  [pdf

    cs.LG cs.AI stat.ML

    Graph Neural Networks: A Review of Methods and Applications

    Authors: Jie Zhou, Ganqu Cui, Shengding Hu, Zhengyan Zhang, Cheng Yang, Zhiyuan Liu, Lifeng Wang, Changcheng Li, Maosong Sun

    Abstract: Lots of learning tasks require dealing with graph data which contains rich relation information among elements. Modeling physics systems, learning molecular fingerprints, predicting protein interface, and classifying diseases demand a model to learn from graph inputs. In other domains such as learning from non-structural data like texts and images, reasoning on extracted structures (like the depen… ▽ More

    Submitted 6 October, 2021; v1 submitted 20 December, 2018; originally announced December 2018.

    Comments: Published at AI Open 2021

  23. arXiv:1812.03315  [pdf, ps, other

    cs.LG eess.SP stat.ML

    A deep learning-based remaining useful life prediction approach for bearings

    Authors: Cheng Cheng, Guijun Ma, Yong Zhang, Mingyang Sun, Fei Teng, Han Ding, Ye Yuan

    Abstract: In industrial applications, nearly half the failures of motors are caused by the degradation of rolling element bearings (REBs). Therefore, accurately estimating the remaining useful life (RUL) for REBs are of crucial importance to ensure the reliability and safety of mechanical systems. To tackle this challenge, model-based approaches are often limited by the complexity of mathematical modeling.… ▽ More

    Submitted 30 August, 2022; v1 submitted 8 December, 2018; originally announced December 2018.

  24. arXiv:1811.10201  [pdf, other

    cs.LG cs.CV stat.ML

    InstaNAS: Instance-aware Neural Architecture Search

    Authors: An-Chieh Cheng, Chieh Hubert Lin, Da-Cheng Juan, Wei Wei, Min Sun

    Abstract: Conventional Neural Architecture Search (NAS) aims at finding a single architecture that achieves the best performance, which usually optimizes task related learning objectives such as accuracy. However, a single architecture may not be representative enough for the whole dataset with high diversity and variety. Intuitively, electing domain-expert architectures that are proficient in domain-specif… ▽ More

    Submitted 23 May, 2019; v1 submitted 26 November, 2018; originally announced November 2018.

  25. arXiv:1810.12881  [pdf, other

    cs.LG cs.CR cs.SI stat.ML

    Data Poisoning Attack against Unsupervised Node Embedding Methods

    Authors: Mingjie Sun, Jian Tang, Huichen Li, Bo Li, Chaowei Xiao, Yao Chen, Dawn Song

    Abstract: Unsupervised node embedding methods (e.g., DeepWalk, LINE, and node2vec) have attracted growing interests given their simplicity and effectiveness. However, although these methods have been proved effective in a variety of applications, none of the existing work has analyzed the robustness of them. This could be very risky if these methods are attacked by an adversarial party. In this paper, we ta… ▽ More

    Submitted 1 November, 2018; v1 submitted 30 October, 2018; originally announced October 2018.

  26. arXiv:1810.10147  [pdf, ps, other

    cs.LG cs.AI cs.CL stat.ML

    FewRel: A Large-Scale Supervised Few-Shot Relation Classification Dataset with State-of-the-Art Evaluation

    Authors: Xu Han, Hao Zhu, Pengfei Yu, Ziyun Wang, Yuan Yao, Zhiyuan Liu, Maosong Sun

    Abstract: We present a Few-Shot Relation Classification Dataset (FewRel), consisting of 70, 000 sentences on 100 relations derived from Wikipedia and annotated by crowdworkers. The relation of each sentence is first recognized by distant supervision methods, and then filtered by crowdworkers. We adapt the most recent state-of-the-art few-shot learning methods for relation classification and conduct a thorou… ▽ More

    Submitted 26 October, 2018; v1 submitted 23 October, 2018; originally announced October 2018.

    Comments: EMNLP 2018. The first four authors contribute equally. The order is determined by dice rolling. Visit our website http://zhuhao.me/fewrel

  27. arXiv:1810.05270  [pdf, other

    cs.LG cs.CV stat.ML

    Rethinking the Value of Network Pruning

    Authors: Zhuang Liu, Mingjie Sun, Tinghui Zhou, Gao Huang, Trevor Darrell

    Abstract: Network pruning is widely used for reducing the heavy inference cost of deep models in low-resource settings. A typical pruning algorithm is a three-stage pipeline, i.e., training (a large model), pruning and fine-tuning. During pruning, according to a certain criterion, redundant weights are pruned and important weights are kept to best preserve the accuracy. In this work, we make several surpris… ▽ More

    Submitted 5 March, 2019; v1 submitted 11 October, 2018; originally announced October 2018.

    Comments: ICLR 2019. Significant revisions from the previous version

  28. arXiv:1808.09830  [pdf, other

    cs.LG stat.ML

    Searching Toward Pareto-Optimal Device-Aware Neural Architectures

    Authors: An-Chieh Cheng, **-Dong Dong, Chi-Hung Hsu, Shu-Huan Chang, Min Sun, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan

    Abstract: Recent breakthroughs in Neural Architectural Search (NAS) have achieved state-of-the-art performance in many tasks such as image classification and language understanding. However, most existing works only optimize for model accuracy and largely ignore other important factors imposed by the underlying hardware and devices, such as latency and energy, when making inference. In this paper, we first… ▽ More

    Submitted 29 August, 2018; v1 submitted 29 August, 2018; originally announced August 2018.

    Comments: ICCAD'18 Invited Paper

  29. arXiv:1807.03233  [pdf

    cs.LG stat.ML

    A New ECOC Algorithm for Multiclass Microarray Data Classification

    Authors: Mengxin Sun, Kunhong Liu, Qingqi Hong, Beizhan Wang

    Abstract: The classification of multi-class microarray datasets is a hard task because of the small samples size in each class and the heavy overlaps among classes. To effectively solve these problems, we propose novel Error Correcting Output Code (ECOC) algorithm by Enhance Class Separability related Data Complexity measures during encoding process, named as ECOCECS. In this algorithm, two nearest neighbor… ▽ More

    Submitted 21 June, 2018; originally announced July 2018.

    Comments: conference paper

  30. arXiv:1802.06516  [pdf, other

    cs.LG cs.AI stat.ML

    Subspace Network: Deep Multi-Task Censored Regression for Modeling Neurodegenerative Diseases

    Authors: Mengying Sun, Inci M. Baytas, Liang Zhan, Zhangyang Wang, Jiayu Zhou

    Abstract: Over the past decade a wide spectrum of machine learning models have been developed to model the neurodegenerative diseases, associating biomarkers, especially non-intrusive neuroimaging markers, with key clinical scores measuring the cognitive status of patients. Multi-task learning (MTL) has been commonly utilized by these studies to address high dimensionality and small cohort size challenges.… ▽ More

    Submitted 28 February, 2018; v1 submitted 18 February, 2018; originally announced February 2018.

  31. Self-paced Convolutional Neural Network for Computer Aided Detection in Medical Imaging Analysis

    Authors: Xiang Li, Aoxiao Zhong, Ming Lin, Ning Guo, Mu Sun, Arkadiusz Sitek, Jie** Ye, James Thrall, Quanzheng Li

    Abstract: Tissue characterization has long been an important component of Computer Aided Diagnosis (CAD) systems for automatic lesion detection and further clinical planning. Motivated by the superior performance of deep learning methods on various computer vision problems, there has been increasing work applying deep learning to medical image analysis. However, the development of a robust and reliable deep… ▽ More

    Submitted 19 July, 2017; originally announced July 2017.

    Comments: accepted by 8th International Workshop on Machine Learning in Medical Imaging (MLMI 2017)

  32. arXiv:1705.02411  [pdf, other

    cs.CL cs.LG stat.ML

    Max-Pooling Loss Training of Long Short-Term Memory Networks for Small-Footprint Keyword Spotting

    Authors: Ming Sun, Anirudh Raju, George Tucker, Sankaran Panchapagesan, Gengshen Fu, Arindam Mandal, Spyros Matsoukas, Nikko Strom, Shiv Vitaladevuni

    Abstract: We propose a max-pooling based loss function for training Long Short-Term Memory (LSTM) networks for small-footprint keyword spotting (KWS), with low CPU, memory, and latency requirements. The max-pooling loss training can be further guided by initializing with a cross-entropy loss trained network. A posterior smoothing based evaluation approach is employed to measure keyword spotting performance.… ▽ More

    Submitted 5 May, 2017; originally announced May 2017.

    Journal ref: Spoken Language Technology Workshop (SLT), 2016 IEEE (pp. 474-480). IEEE

  33. arXiv:1703.06748  [pdf, other

    cs.LG cs.CR stat.ML

    Tactics of Adversarial Attack on Deep Reinforcement Learning Agents

    Authors: Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, Min Sun

    Abstract: We introduce two tactics to attack agents trained by deep reinforcement learning algorithms using adversarial examples, namely the strategically-timed attack and the enchanting attack. In the strategically-timed attack, the adversary aims at minimizing the agent's reward by only attacking the agent at a small subset of time steps in an episode. Limiting the attack activity to this subset helps pre… ▽ More

    Submitted 12 November, 2019; v1 submitted 7 March, 2017; originally announced March 2017.

    Comments: To Appear at IJCAI 2017. Project website: http://yenchenlin.me/adversarial_attack_RL/

  34. Generalized Canonical Correlation Analysis for Classification

    Authors: Cencheng Shen, Ming Sun, Minh Tang, Carey E. Priebe

    Abstract: For multiple multivariate data sets, we derive conditions under which Generalized Canonical Correlation Analysis (GCCA) improves classification performance of the projected datasets, compared to standard Canonical Correlation Analysis (CCA) using only two data sets. We illustrate our theoretical results with simulations and a real data experiment.

    Submitted 26 June, 2014; v1 submitted 30 April, 2013; originally announced April 2013.

    Comments: 28 pages, 3 figures, 7 tables

    Journal ref: Journal of Multivariate Analysis 130, 310-322, 2014

  35. arXiv:1209.3761  [pdf, other

    stat.ML cs.LG

    Generalized Canonical Correlation Analysis for Disparate Data Fusion

    Authors: Ming Sun, Carey E. Priebe, Minh Tang

    Abstract: Manifold matching works to identify embeddings of multiple disparate data spaces into the same low-dimensional space, where joint inference can be pursued. It is an enabling methodology for fusion and inference from multiple and massive disparate data sources. In this paper we focus on a method called Canonical Correlation Analysis (CCA) and its generalization Generalized Canonical Correlation Ana… ▽ More

    Submitted 17 September, 2012; originally announced September 2012.

  36. arXiv:1205.3193  [pdf, other

    cs.IR stat.ML

    A Comparative Study of Collaborative Filtering Algorithms

    Authors: Joonseok Lee, Mingxuan Sun, Guy Lebanon

    Abstract: Collaborative filtering is a rapidly advancing research area. Every year several new techniques are proposed and yet it is not clear which of the techniques work best and under what conditions. In this paper we conduct a study comparing several collaborative filtering techniques -- both classic and recent state-of-the-art -- in a variety of experimental contexts. Specifically, we report conclusion… ▽ More

    Submitted 14 May, 2012; originally announced May 2012.

    Comments: 27 pages, 12 figures

    ACM Class: I.2.6; H.2.8